We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Check kzalloc() in lpfc_sli4_cgn_params_read() If kzalloc() fails in lpfc_sli4_cgn_params_read(), then we rely on lpfc_read_object()'s routine to NULL check pdata. Currently, an early return error is thrown from lpfc_read_object() to protect us from NULL ptr dereference, but the errno code is -ENODEV. Change the errno code to a more appropriate -ENOMEM.
Reserved 2025-04-16 | Published 2025-05-02 | Updated 2025-05-04 | Assigner Linuxgit.kernel.org/...c/67b8343998b84418bc5b5206aa01fe9b461a80ef
git.kernel.org/...c/4829a1e1171536978b240a1438789c2e4d5c9715
git.kernel.org/...c/908dd9a0853a88155a5a36018c7e2b32ccf20379
git.kernel.org/...c/312320b0e0ec21249a17645683fe5304d796aec1
Support options